Back to Home

Security at Credlier

We take the security of your data seriously. Learn about the measures we take to protect your information.

Encryption

All data is encrypted at rest using AES-256 and in transit using TLS 1.3.

Access Control

Role-based access control with granular permissions for team members.

Audit Logging

Comprehensive audit logs of all account activity and API access.

Infrastructure

Hosted on SOC 2 Type II certified cloud infrastructure with 99.99% uptime.

Compliance & Certifications

SOC 2 Type IICertified
GDPRCompliant
CCPACompliant
HIPAAAvailable
ISO 27001In Progress
Our Security Practices
How we protect your data every day

Data Encryption

All sensitive data, including API keys and credentials, are encrypted using AES-256 encryption at rest. Data in transit is protected using TLS 1.3 with perfect forward secrecy.

Access Management

We implement the principle of least privilege across our organization. Employee access to production systems is strictly controlled and regularly audited.

Penetration Testing

We conduct regular penetration tests with third-party security firms. Our bug bounty program rewards security researchers who responsibly disclose vulnerabilities.

Incident Response

Our security team monitors systems 24/7 and maintains documented incident response procedures. We commit to notifying affected customers within 72 hours of any breach.

Report a Vulnerability

Found a security issue? We appreciate responsible disclosure and offer rewards for valid reports.